/freebsd-13-stable/sys/netipsec/ |
H A D | key.c | 964 struct secashead *sah; local 973 LIST_FOREACH(sah, SAHADDRHASH_HASH(saidx), addrhash) { 976 kdebug_secash(sah, " ")); 977 if (sah->saidx.proto != IPPROTO_TCP) 979 if (!key_sockaddrcmp(&saidx->dst.sa, &sah->saidx.dst.sa, 0) && 980 !key_sockaddrcmp(&saidx->src.sa, &sah->saidx.src.sa, 0)) 983 if (sah != NULL) { 985 sav = TAILQ_LAST(&sah->savtree_alive, secasvar_queue); 987 sav = TAILQ_FIRST(&sah->savtree_alive); 1017 struct secashead *sah; local 1141 struct secashead *sah; local 1367 struct secashead *sah; local 2839 struct secashead *sah; local 2862 struct secashead *sah = *psah; local 2876 key_delsah(struct secashead *sah) argument 2901 struct secashead *sah; local 3007 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 3127 struct secashead *sah; local 4477 struct secashead *sah, *nextsah; local 5068 struct secashead *sah; local 5118 struct secashead *sah; local 5239 LIST_INSERT_HEAD(SAHADDRHASH_HASH(saidx), sah, addrhash); local 5836 key_setident(struct secashead *sah, const struct sadb_msghdr *mhp) argument 6060 struct secashead *sah; local 6122 struct secashead *sah; local 6944 struct secashead *sah; local 7408 struct secashead *sah, *nextsah; local 7452 struct secashead *sah, *nextsah; local 7565 struct secashead *sah; local 8324 struct secashead *sah; local [all...] |
H A D | xform_ah.c | 157 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6) { 585 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 595 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 641 error = ah_massage_headers(&m, sav->sah->saidx.dst.sa.sa_family, 706 saidx = &sav->sah->saidx; 861 switch (sav->sah->saidx.dst.sa.sa_family) { 875 sav->sah->saidx.dst.sa.sa_family, 876 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 885 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 899 ipsec_address(&sav->sah [all...] |
H A D | xform_ipcomp.c | 299 saidx = &sav->sah->saidx; 353 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 424 switch (sav->sah->saidx.dst.sa.sa_family) { 439 sav->sah->saidx.dst.sa.sa_family, 440 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 449 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 463 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 582 __func__, ipsec_address(&sav->sah->saidx.dst, buf, 591 switch (sav->sah->saidx.dst.sa.sa_family) { 612 switch (sav->sah [all...] |
H A D | ipsec_input.c | 289 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 290 saidx = &sav->sah->saidx; 304 __func__, ipsec_address(&sav->sah->saidx.dst, 506 IPSEC_ASSERT(sav->sah != NULL, ("null SAH")); 507 saidx = &sav->sah->saidx; 519 __func__, ipsec_address(&sav->sah->saidx.dst, buf,
|
H A D | key_debug.c | 789 kdebug_secash(struct secashead *sah, const char *indent) argument 792 IPSEC_ASSERT(sah != NULL, ("null sah")); 795 printf("SAH { refcnt=%u state=%s\n", sah->refcnt, 796 kdebug_secasv_state(sah->state)); 799 kdebug_secasindex(&sah->saidx, indent); 854 kdebug_secash(sav->sah, " "); 973 ipsec_address(&sav->sah->saidx.src, sbuf, sizeof(sbuf)), 974 ipsec_address(&sav->sah->saidx.dst, dbuf, sizeof(dbuf)));
|
H A D | ipsec_output.c | 222 dst = &sav->sah->saidx.dst; 233 error = ipsec_encap(&m, &sav->sah->saidx); 272 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 540 dst = &sav->sah->saidx.dst; 553 error = ipsec_encap(&m, &sav->sah->saidx); 587 IPSEC_OSTAT_INC(sav->sah->saidx.proto, nopf); 722 saidx = &sav->sah->saidx;
|
H A D | keydb.h | 155 struct secashead *sah; /* back pointer to the secashead */ member in struct:secasvar
|
H A D | xform_esp.c | 320 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 500 saidx = &sav->sah->saidx; 592 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 606 ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), 618 &sav->sah->saidx.dst, buf, sizeof(buf)), 722 saidx = &sav->sah->saidx;
|
H A D | udpencap.c | 222 if (sav->sah->saidx.dst.sa.sa_family == AF_INET6)
|
H A D | ipsec.c | 1302 if (sav->sah->saidx.proto == IPPROTO_ESP) 1304 else if (sav->sah->saidx.proto == IPPROTO_AH) 1343 if (sav->sah->saidx.proto == IPPROTO_ESP) 1345 else if (sav->sah->saidx.proto == IPPROTO_AH)
|
H A D | xform_tcp.c | 182 switch (sav->sah->saidx.dst.sa.sa_family) {
|
/freebsd-13-stable/sys/net/ |
H A D | if_ipsec.c | 465 if (sav->sah->saidx.mode != IPSEC_MODE_TUNNEL || 466 sav->sah->saidx.proto != IPPROTO_ESP) 470 CK_LIST_FOREACH(sc, ipsec_idhash(sav->sah->saidx.reqid), idhash) { 474 sav->sah->saidx.src.sa.sa_family); 477 sav->sah->saidx.reqid != saidx->reqid) 480 if (key_sockaddrcmp(&sav->sah->saidx.dst.sa, 483 if (key_sockaddrcmp(&sav->sah->saidx.src.sa,
|
/freebsd-13-stable/sys/dev/qat/ |
H A D | qat.c | 1245 const struct auth_hash *sah = hash_def->qshd_alg->qshai_sah; local 1250 hmac_init_ipad(sah, key, klen, &ctx); 1253 hmac_init_opad(sah, key, klen, &ctx);
|
/freebsd-13-stable/sys/dev/ixl/ |
H A D | i40e_adminq_cmd.h | 546 __le16 sah; member in struct:i40e_aqc_mng_laa
|